Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations.
Alexander O. AkandeVu N. TranPublished in: ICISSP (2021)
Keyphrases
- security breaches
- access control
- information security management
- counter terrorism
- information systems
- network security
- situational awareness
- decision making
- service management
- security policies
- information security
- security systems
- security requirements
- mission critical
- remote server
- intrusion detection
- object oriented